Sciweavers

21 search results - page 1 / 5
» mobisys 2005
Sort
View
MOBISYS
2005
ACM
14 years 4 months ago
Accuracy characterization for metropolitan-scale Wi-Fi localization
Yu-Chung Cheng, Yatin Chawathe, Anthony LaMarca, J...
MOBISYS
2005
ACM
14 years 4 months ago
A systems architecture for ubiquitous video
Realityflythrough is a telepresence/tele-reality system that works in the dynamic, uncalibrated environments typically associated with ubiquitous computing. By harnessing networke...
Neil J. McCurdy, William G. Griswold
MOBISYS
2005
ACM
14 years 4 months ago
Cracking the Bluetooth PIN
This paper describes the implementation of an attack on the Bluetooth security mechanism. Specifically, we describe a passive attack, in which an attacker can find the PIN used du...
Yaniv Shaked, Avishai Wool
MOBISYS
2005
ACM
14 years 4 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
MOBISYS
2005
ACM
14 years 4 months ago
Slingshot: deploying stateful services in wireless hotspots
Given a sufficiently good network connection, even a handheld computer can run extremely resource-intensive applications by executing the demanding portions on a remote server. At...
Ya-Yunn Su, Jason Flinn